Secure user environments aren't only about the software and permissions configured for a user. They're also about the devices each user can introduce into that configuration. The Desktop Authority USB and Port Security component controls both device usage (like flash drives, printers, cameras and mobile devices) as well as port access (such as serial, infrared, USB and more) --all according to each user's unique levels of authentication and access.

Quest Reporter provides automated discovery and comparison of configuration-related items to support planning, securing and auditing of your Windows infrastructure. Reporter enables IT organisations to collect, compare, report on and resolve Active Directory and Windows-based configurations which is essential for change auditing, Windows security assessments, or AD pre- and post-migration analyses. Armed with this information, organisations can quickly make strategic and tactical security decisions that involve their Active
Directory and Windows environment.

Quest MessageStats¿ is the most complete and comprehensive messaging reporting and analysis solution in the industry. Used on more than 15 million Exchange mailboxes around the world everyday, MessageStats helps reduce and quantify your Exchange investment.

ChangeAuditor for Active Directory Queries provides real-time tracking,
analysis and reporting on all Microsoft® Active Directory®-based and
LDAP queries. By detecting queries in real time, you can eliminate the
time and complexity required for auditing and determine the source of
queries prior to a directory migration or consolidation. You can also
measure domain controller performance and easily translate query data
into the simple terms of who, what, when, where and originating
workstation.

ActiveRoles Server solves security issues and meets
those never-ending compliance requirements by securing and protecting
Active Directory simply and efficiently. By delivering automated tools
for user and group management and Active Directory delegation,
ActiveRoles Server overcomes the native shortcomings of Active
Directory, so you can do your job faster. And thanks to its modular
architecture, your organization can afford to meet your business
requirements today and in the future.

As one of the most robust configuration tools in your Windows infrastructure, Group Policy plays a major role in establishing a secure and compliant networking environment for your users. With Group Policy regulating everything from critical business processes and security settings to individual workstations and printers, managing Group Policy Objects (GPOs) can become time-consuming and expensive.